Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 1 February 2011

Data governance and leaks drives Varonis growth

Posted on 08:45 by Unknown

Varonis customers ENJOY peace of mind ABOUT THEIR DATA while the company rockets to a FIFTH year of consecutive growth

“With the amount of data we need to manage, it’s physically impossible to do it manually without a solution like DatAdvantage® and be 100 percent confident that it’s accurate. Varonis gives us peace of mind.”   -  James Herbert, HIT Entertainment

New York – Feb. 1, 2011 – Varonis Systems Inc., the leading provider of comprehensive data governance software, announced today it achieved its fifth consecutive year of record growth. In 2010, the company grew sales 63 percent year-over-year from 2009, increased its worldwide licensed installations to more than 3,500 and added 340 new customers, bringing the number of organizations and agencies that use Varonis to manage and protect their data to 940 globally.

“While our team is very pleased with the continued momentum and how rapidly our new products are being adopted by our install base and new customers, our focus remains on the underlying drivers of our growth – organizations throughout the world need to collaborate digitally without fear of their sensitive data being exposed,” said Ohad Korkus, executive vice president of engineering, chief technical officer and co-founder. “We continue to experience hyper-growth because our software is engineered to enable safe and efficient digital collaboration without disrupting existing business processes. Almost every organizational workflow is becoming digital, yielding massive gains in productivity. By automating data governance activities, we see the same boost in productivity while ensuring only the right people have access to the right data.”

Eighty percent of the world’s data is unstructured (documents, spreadsheets, presentations, emails, images, video, audio, etc.) and it’s growing by 50-plus percent every year according to Gartner. While digital collaboration introduces efficiencies, it also exponentially increases the risk of data exposure as cross-functional teams access more and more data sets. The complexities of collaboration and volumes of data simply overwhelm organizations that try to protect their data manually. By automating manual data governance processes, risk is reduced as are labor costs. The high-profile security breaches that have occurred in the past year have shown that companies must be proactive in automating management and protection of their data by systematically restricting access to sensitive data, and monitoring its use and potential abuse.

“Varonis has enabled us to remove the risks associated with data permission changes within our IT environment,” said Colin Lennox, technical services manager at Baillie Gifford. “Employees with responsibility for sensitive and critical data now have confidence that there are no security exposures. As an organization, we can prove to our regulators that our IT controls are stringent and that we are providing effective protection around our data."

Varonis customers have the ability to completely standardize unstructured and semi-structured data protection and management on their file systems, NAS, SharePoint sites and Exchange mailboxes with the Varonis® Metadata Framework™ technology that forms the foundation of Varonis software. Organizations can effectively and automatically manage data access control, audit, ownership, classification, entitlements and authorization processes on the platforms that host unstructured and semi-structured data. The Varonis® Metadata Framework™ enables organizations to expand digital collaboration boundaries safely while at the same time significantly increasing IT workforce productivity for daily data protection and management tasks.

“Varonis is set for a further period of growth in the coming year as more organizations recognize data access and usage monitoring, permissions management and revocation, identification of data at risk, and finding data owners and classifying data no longer need to be done manually,” said Yaki Faitelson, chief executive officer, president and co-founder of Varonis Systems. “The instinctive reaction of many to inappropriate data access is to try and lock down all data — that is not only impossible, it is unnecessary. What was previously impossible is now possible through the intelligent use of metadata and data governance automation.”

From mid-tier businesses to government agencies and global enterprises, Varonis customers immediately see where their critical data resides, who is accessing it, who owns it, who has access to it, who should and should not have access to it, and then take action through quick revocation of excessive access controls and simplified data management processes.

Leveraging Metadata Technology

Collecting, analyzing and presenting metadata - data about data (or information about information) - for decision making and automation is a monumental engineering task. A critical part of limiting and automating access is the ability to leverage metadata. When it comes to identifying sensitive data and protecting access to it, a number of types of metadata are relevant: user and group information, permissions information, access activity, and sensitive content indicators. A key benefit to leveraging metadata for preventing data loss is that it can be used to focus and accelerate the data classification process. In many instances, the ability to leverage metadata can speed up the process by up to 90 percent, providing a shortlist of where an organization’s most sensitive data is, where it is most at risk, who has access to it and who shouldn’t.

The Varonis Metadata Framework™ technology that forms the foundation of Varonis software,  non-intrusively collects this critical metadata, generates metadata where existing metadata is lacking (e.g. its file system filters and content inspection technologies), pre-processes, normalizes, analyzes, stores, and presents the metadata to IT administrators in an interactive, dynamic interface – automating the process of finding areas with excessive permissions and abnormal access activity, understanding  who can access, who is accessing, who shouldn't have access, and who owns the data, and enabling remediation of risk faster than traditional data protection products.

Watch the IDC Technology Spotlight on Varonis

2010 Results

· 940-customers – Varonis added over 340 new customers in 2010

· 3,500-plus licensed installations worldwide – Varonis added over 1,900 in 2010

· 63 percent year-over-year annual sales growth

· Release of Varonis® DatAdvantage® for Exchange aggregates user, permissions, data and access event information from mailboxes and public folders. Sophisticated analytics applied to the collected information show detailed data use and determine rightful access based on business need. Key functionalities include bi-directional visibility into mail store permissions, a complete audit trail of email activity, recommendations on removing excess permissions and modeling of changes, data ownership identification through analysis of user activity, the ability to effect changes to permissions and groups, and the ability to include other metadata and platforms (e.g. classification information via IDU Classification Framework®, SharePoint, Windows, UNIX, etc.).

· Release of Varonis® DatAdvantage® for AIX aggregates user, permissions, data and access event information from directories services (e.g. LDAP and NIS) and UNIX servers. Key functionalities include bi-directional visibility into file system permissions, including identification of world-writable directories and files, a complete audit trail of file events, recommendations on removing excess permissions and modeling of changes, data ownership identification through analysis of user activity, the ability to effect changes to permissions and groups, and the ability to include other metadata and platforms (e.g. classification information via  IDU Classification Framework®, SharePoint, Windows, etc.). Sophisticated analytics applied to the collected information shows areas of excess access and simulated results of both group and permissions changes.

Varonis is the leader in unstructured and semi-structured data governance for file systems, SharePoint and NAS devices, and Exchange servers. The company was named "Cool Vendor" in Risk Management and Compliance by Gartner, and voted one of the "Fast 50 Reader Favorites" on FastCompany.com. Varonis has over 3500 installations worldwide. Based on patented technology and a highly accurate analytics engine, Varonis' solutions give organizations total visibility and control over their data, ensuring that only the right users have access to the right data at all times. Varonis is headquartered in New York, with regional offices in Europe, Asia and Latin America, and research and development offices in Hertzliya, Israel.

Source: Eskenzi PR Ltd. for Varonis Systems

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ▼  February (30)
      • Security Concerns over Cloud Storage
      • Lieberman Software warns on new hacking trend of m...
      • 95% of parents found children accessing internet p...
      • Parallels to leverage Scality RING technology in i...
      • Connectria selects Scality to launch a public clou...
      • Flash disk security is very different to magnetic ...
      • New Financial Trojan OddJob Keeps Online Banking S...
      • US worries over Internet `kill switch' highlights ...
      • CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLO...
      • Beware the Enemy Within
      • Infosecurity Europe welcomes plans for rapid taked...
      • ISACA’s EuroCACS Examines Data Protection, Cloud C...
      • Imperva warns on the real insider security threat
      • Tufin unveils new functionality & updated PCI DSS ...
      • Trusteer Secure Web Access prevents attacks that e...
      • Venafi launches 1st universal automated management...
      • Safer Internet Day - The role of Security within S...
      • `What are the banks not telling us about card frau...
      • DES Offers Free Encryption
      • Tufin introduces next generation firewall manageme...
      • Infosecurity Europe 2011 Hall of Fame nominations ...
      • Huddersfield NHS laptop loss highlights need to pr...
      • Innovative software solutions to reduce business e...
      • Talk of Intel developing IT security game-changer ...
      • SOURCEFIRE’S IMMUNET ANTI-MALWARE SOLUTION DELIVERS
      • Lieberman Software and Q1 Labs Partner to stop ins...
      • Data governance and leaks drives Varonis growth
      • ISACA report emphasizes governance's central role ...
      • WikiLeaks DDoS arrests welcomed by Infosecurity Eu...
      • KOBIL mIDentity secures e-Banking of the BBVA (Sui...
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile